CN101281569A - Method for using network edition software protecting equipment to control software client terminal quantity - Google Patents
Method for using network edition software protecting equipment to control software client terminal quantity Download PDFInfo
- Publication number
- CN101281569A CN101281569A CNA2008101065667A CN200810106566A CN101281569A CN 101281569 A CN101281569 A CN 101281569A CN A2008101065667 A CNA2008101065667 A CN A2008101065667A CN 200810106566 A CN200810106566 A CN 200810106566A CN 101281569 A CN101281569 A CN 101281569A
- Authority
- CN
- China
- Prior art keywords
- soft ware
- software
- ware authorization
- protecting equipment
- authorization permission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a method for controlling client number by using a network version software protection device. Specifically, the software authorized permission is managed inside of the network version software protection device, therefore the problem that software authorized permission management programs are cracked is solved.
Description
Technical field
The present invention relates to the software copyright protection field, particularly use the method for network edition software protecting equipment to control software client terminal quantity.
Background technology
Using software protecting equipment is the main means that realize software security protection and copyright protection.Software protecting equipment refers in particular to a kind of hardware device that is attached on the computer interface (such as, interfaces such as USB interface, serial ports, parallel port), and operation specific software is on computers carried out software security protection and copyright protection.Storing the software use authority of specific software in the software protecting equipment, for example determining whether this software can be used, which module or function in this software can be used or the like.These software use authorities are commonly called the soft ware authorization permission.
The software protecting equipment of prior art mainly contains two kinds of citation forms: a kind of is the stand-alone software protective device, this software protecting equipment can be connected on the computer interface at running software place, for one or more the specific softwares on this computing machine provide one or more protections (such as, safeguard protection and/or copyright protection etc.); Another kind is a network edition software protecting equipment; this software protecting equipment can be connected on any computer interface of filling the post of server in the network; this is filled the post of, and operation has service routine on the computing machine of server; by network edition software protecting equipment for one or more the specific softwares that move on other computing machine in this network provide one or more protections (such as, safeguard protection and/or copyright protection etc.).
The stand-alone software protective device provides protection only for the software on this machine, does not need the support of network environment, as long as therefore carry the stand-alone software protective device, just can authorize the claimed software of operation on any computing machine.Be subjected to the software that network edition software protecting equipment protected then different, have only the computing machine that is in the same network with computing machine could move this software, be applicable to software usually in the enterprises use as server.Adopt the advantage of network edition software protecting equipment to be: a network edition software protecting equipment can be protected the authorization of many cover softwares; for example in network edition software protecting equipment, preserve the software client quantity that to move simultaneously, just may be limited in the enterprises to use what software copies simultaneously.Can reduce shared cost of software protecting equipment and ratio like this, help enterprise simultaneously the use of software is managed.
Because network edition software protecting equipment is to provide service for a plurality of computing machines in the same network simultaneously by network; and the inner soft ware authorizations permission that has many cover softwares, thereby need to install and move one on the server and provide services on the Internet and the software of soft ware authorization License Management.Because the soft ware authorization permission is managed by operation software on computers, so the cracker can make a software license mandate to be used by a plurality of softwares, thereby obtain illegal software license by the supervisory routine of the authorization that cracks.
Summary of the invention
In view of this, the invention provides a kind of method, thereby solve because the problem that the soft ware authorization license management program is cracked in the permission of network edition software protecting equipment inner management soft ware authorization.
Technical scheme of the present invention is: when bringing into use network edition software protecting equipment, software includes a changeable key part that all can be updated when at every turn using this soft ware authorization permission earlier from soft ware authorization permission of network edition software protecting equipment application in this soft ware authorization permission; In software running process, software all must provide this soft ware authorization permission at every turn when calling network edition software protecting equipment; Network edition software protecting equipment is checked the soft ware authorization permission at every turn when using software, comprising changeable key; If the soft ware authorization permission is illegal, then do not allow to call the soft ware authorization permission, if the soft ware authorization permission is legal, then allow to call the soft ware authorization permission, and upgrade changeable key part in this soft ware authorization permission.When finishing to use network edition software protecting equipment, software will discharge acquired soft ware authorization permission, reclaims the soft ware authorization permission by network edition software protecting equipment.
According to an aspect of the present invention, provide a kind of method of client terminal quantity of Control Network version software protecting equipment, it is characterized in that the method comprising the steps of:
A, when bringing into use network edition software protecting equipment, software is permitted to network edition software protecting equipment application soft ware authorization;
B, in software running process, software uses the soft ware authorization permission to call network edition software protecting equipment;
C, at every turn use soft ware authorization permission after, network edition software protecting equipment is the update software authorization all;
D, when finish using network edition software protecting equipment, software discharges the soft ware authorization permission.
According to an aspect of the present invention, its feature also is, also comprises in the steps A: whether the inspection of network edition software protecting equipment has idle soft ware authorization permission.
According to an aspect of the present invention, its feature is that also if idle soft ware authorization permission is arranged, network edition software protecting equipment is that software is issued the soft ware authorization permission so; If do not have idle soft ware authorization permission, so, finish the application of soft ware authorization permission.
According to an aspect of the present invention, its feature also is, also comprises among the step B: software all must provide described soft ware authorization permission at every turn when calling network edition software protecting equipment.
According to an aspect of the present invention, its feature also is, also comprises among the step B: network edition software protecting equipment is checked the soft ware authorization permission.
According to an aspect of the present invention, its feature is that also network edition software protecting equipment checks this soft ware authorization permission whether legal by other information of the fixed key in the permission of inspection soft ware authorization and/or changeable key and/or soft ware authorization permission.
According to an aspect of the present invention, its feature also is, if the soft ware authorization permission is legal, then allows software transfer network edition software protecting equipment, otherwise stops software transfer network edition software protecting equipment.
According to an aspect of the present invention, its feature also is, also comprises among the step B: use fixed key and/or changeable key in the soft ware authorization permission that the communication data between software and the network edition software protecting equipment is encrypted.
According to an aspect of the present invention, its feature also is, also comprises among the step C: network edition software protecting equipment is according to changeable key in the predetermined Policy Updates soft ware authorization permission.
According to an aspect of the present invention, its feature also is, also comprises after step C: determine whether to finish calling network edition software protecting equipment.
According to an aspect of the present invention, its feature also is, if continue to use software protecting equipment, then returns step B, otherwise execution in step D.
According to an aspect of the present invention, its feature also is, comprises among the step D: software sends the application that discharges the soft ware authorization permission to network edition software protecting equipment.
According to an aspect of the present invention, its feature also is, also comprises after step D: network edition software protecting equipment reclaims the soft ware authorization permission.
According to an aspect of the present invention, its feature is that also the information of other of the fixed key during network edition software protecting equipment is permitted by the inspection soft ware authorization and/or changeable key and/or soft ware authorization permission checks the soft ware authorization permission whether legal.
According to an aspect of the present invention, its feature also is, if the soft ware authorization permission is legal, then reclaims the soft ware authorization permission, otherwise does not allow software to discharge the soft ware authorization permission.
Description of drawings
Fig. 1: schematic flow sheet of the present invention.
Fig. 2: the soft ware authorization permission structural representation of one embodiment of the invention.
Fig. 3: the software license authorized application schematic flow sheet of one embodiment of the invention.
Fig. 4: the use schematic flow sheet of the soft ware authorization permission of one embodiment of the invention.
Fig. 5: the schematic flow sheet that the soft ware authorization of one embodiment of the invention discharges.
Embodiment
For making purpose of the present invention, technical scheme and advantage clearer, below with reference to the accompanying drawing embodiment that develops simultaneously, the present invention is further elaborated.
Fig. 1 is a process flow diagram of the present invention, as shown in Figure 1, and of the present invention may further comprise the steps:
Software end workflow:
In this step, when bringing into use network edition software protecting equipment, software is permitted to network edition software protecting equipment application soft ware authorization.
In this step, software is provided at the soft ware authorization permission of issuing in 114 steps to network edition software protecting equipment when calling network edition software protecting equipment.Can also comprise that simultaneously fixing the and/or changeable key that uses in the soft ware authorization permission encrypts the communication data between software and the network edition software protecting equipment.
In this step, software determines whether to need to continue to use software protecting equipment, continues if desired to use software protecting equipment, then returns step 102, otherwise execution in step 104.
In this step, software sends the application that discharges the soft ware authorization permission to network edition software protecting equipment.
Network edition software protecting equipment end workflow:
In this step, whether the inspection of network edition software protecting equipment has idle soft ware authorization permission, and if any the soft ware authorization permission of free time, then execution in step 114, otherwise execution in step 113.
In this step, network edition software protecting equipment stops the process of software application soft ware authorization permission.Because software does not obtain the usage license of network edition software protecting equipment, thereby causes software can't use network edition software protecting equipment, reached the restriction purpose of the copy number of the software of use simultaneously.
In this step, network edition software protecting equipment is issued the soft ware authorization permission for the software of application soft ware authorization permission.After software running process in software can get permission to call network edition software protecting equipment according to the permission of this soft ware authorization.Comprise a changeable key part in the soft ware authorization permission, the changeable key part after all can be updated in each use according to the rule that sets in advance.
In this step, whether the information of other of fixed key during the soft ware authorization that network edition software protecting equipment is sent by software end in the inspection step 102 is permitted and/or changeable key and/or soft ware authorization permission checks this soft ware authorization permission legal.If the soft ware authorization permission is legal, then execution in step 117, otherwise execution in step 116.
In this step, network edition software protecting equipment stops this invoked procedure.Because network edition software protecting equipment has stopped this invoked procedure, software can not get its data that need, so software can not continue operation.
In this step, the data that network edition software protecting equipment process software end is sent, and return result.Can also comprise simultaneously that the fixed key and/or the changeable key that use in the soft ware authorization permission are decrypted communication data.
Network edition software protecting equipment in this step is according to the changeable key part in the Policy Updates soft ware authorization permission of preliminary election setting.
In this step, whether the information of other of the fixed key during network edition software protecting equipment is permitted by the inspection soft ware authorization and/or changeable key and/or soft ware authorization permission checks this soft ware authorization permission legal.If legal, then reclaim the soft ware authorization permission, otherwise do not allow software to discharge this soft ware authorization permission.
The solution of the present invention is because the management of soft ware authorization permission is in network edition software protecting equipment inside, and the cracker can't obtain illegal software license by the authorization supervisory routine that cracks.
Fig. 2 is the structure of the soft ware authorization permission of one embodiment of the invention, and the soft ware authorization permission in the present embodiment comprises authorization index, authorization ID, key.Each soft ware authorization that uses permits that key all can be updated afterwards.
Fig. 3 is the soft ware authorization application process synoptic diagram of one embodiment of the invention, and as shown in Figure 3, soft ware authorization permission application may further comprise the steps:
In this step, the software end generates the data of 4 bytes as the soft ware authorization license ID.
In this step, software sends to network edition software protecting equipment and generates the soft ware authorization license ID, permits to network edition software protecting equipment application soft ware authorization.
Whether the inspection of network edition software protecting equipment has idle soft ware authorization permission in this step.If have then issue soft ware authorization permission for software, and write down this soft ware authorization license ID, return soft ware authorization and permit to software.
Fig. 4 be one embodiment of the invention soft ware authorization can the use schematic flow sheet, as shown in Figure 4, this flow process comprises following steps:
The workflow of software end:
Step 400 uses the soft ware authorization license key to encrypt the data of calling network edition software protecting equipment.
The cryptographic algorithm of using in this step can be symmetry algorithm, asymmetric arithmetic.The algorithm that present embodiment uses is encrypted soft ware authorization license ID and software license index with the DES algorithm earlier.Use the des encryption result that data are made XOR.
Step 401 uses the soft ware authorization permission to call network edition software protecting equipment.
In this step, software from the application of network edition software protecting equipment to soft ware authorization permission all or part of information and encrypt after the data of calling send to network edition software protecting equipment.In the present embodiment, software only needs to permit soft ware authorization the key of index, soft ware authorization permission and the software protecting equipment that data encrypted sends to the network edition to get final product.
In this step, the software end is according to the key part in the rule transformation soft ware authorization permission that sets in advance.With the new key data decryption to returning in step 403 after changing, and in calling next time, data are encrypted.
In this step, the data that software uses the new key decryption step 415 after upgrading to return, the decipherment algorithm of use is identical with the employed algorithm of step 400.
The workflow of network edition software protecting equipment:
In this step; network edition software protecting equipment by check key whether with network edition software protecting equipment in the key agreement preserved check whether the soft ware authorization permission legal; if inconsistent then think that soft ware authorization permission is illegal, if unanimity then think that the soft ware authorization permission is legal.
Step 413 if the soft ware authorization permission is legal, allows to call, otherwise does not allow.
In this step,, then stop this and call if the soft ware authorization permission is illegal in the step 412; If legal, then use the call data of the secret key decryption of soft ware authorization permission from software termination receipts, allow software transfer network edition software protecting equipment.The decipherment algorithm that uses is identical with the employed algorithm of step 400.
In this step, network edition software protecting equipment is used for the data that step 415 encryption return data and next deciphering are called according to the key part of the Policy Updates soft ware authorization permission that sets in advance.
Step 415 uses new key to encrypt the data of returning.
In this step, network edition software protecting equipment uses the secret key encryption return data after upgrading.The cryptographic algorithm of using is identical with the employed algorithm of step 400.
Fig. 5 is the release schematic flow sheet of soft ware authorization permission, and as shown in Figure 5, the release flow process of soft ware authorization permission comprises following steps
In this step, software sends to network edition software protecting equipment to the key of soft ware authorization permission index and soft ware authorization permission.
In this step, the soft ware authorization license key that the inspection of network edition software protecting equipment is received from the software termination.If legal, network edition software protecting equipment reclaims the soft ware authorization permission.Otherwise do not allow the release of this soft ware authorization permission.
Claims (15)
1, a kind of method of client terminal quantity of Control Network version software protecting equipment is characterized in that the method comprising the steps of:
A, when bringing into use network edition software protecting equipment, software is permitted to network edition software protecting equipment application soft ware authorization;
B, in software running process, software uses the soft ware authorization permission to call network edition software protecting equipment;
C, at every turn use soft ware authorization permission after, network edition software protecting equipment is the update software authorization all;
D, when finish using network edition software protecting equipment, software discharges the soft ware authorization permission.
2, method according to claim 1 is characterized in that, also comprises in the steps A: whether the inspection of network edition software protecting equipment has idle soft ware authorization permission.
3, method according to claim 2 is characterized in that, if idle soft ware authorization permission is arranged, network edition software protecting equipment is that software is issued the soft ware authorization permission so; If do not have idle soft ware authorization permission, finish the application of soft ware authorization permission so.
4, method according to claim 1 is characterized in that, also comprises among the step B: software all must provide described soft ware authorization permission at every turn when calling network edition software protecting equipment.
5, method according to claim 4 is characterized in that, also comprises among the step B: network edition software protecting equipment is checked the soft ware authorization permission.
6, method according to claim 5; it is characterized in that network edition software protecting equipment checks this soft ware authorization permission whether legal by other information of the fixed key in the permission of inspection soft ware authorization and/or changeable key and/or soft ware authorization permission.
7, method according to claim 6 is characterized in that, if the soft ware authorization permission is legal, then allows software transfer network edition software protecting equipment, otherwise stops software transfer network edition software protecting equipment.
8, method according to claim 4 is characterized in that, also comprises among the step B: use fixed key and/or changeable key in the soft ware authorization permission that the communication data between software and the network edition software protecting equipment is encrypted.
9, method according to claim 8 is characterized in that, also comprises among the step C: network edition software protecting equipment is according to changeable key in the predetermined Policy Updates soft ware authorization permission.
10, method according to claim 9 is characterized in that, also comprises after step C: determine whether to finish calling network edition software protecting equipment.
11, method according to claim 10 is characterized in that, if continue to use software protecting equipment, then returns step B, otherwise execution in step D.
12, according to the described method of claim 1-11, it is characterized in that, comprise among the step D: software sends the application that discharges the soft ware authorization permission to network edition software protecting equipment.
13, method according to claim 12 is characterized in that, also comprises after step D: network edition software protecting equipment reclaims the soft ware authorization permission.
14, method according to claim 13; it is characterized in that the information of other of the fixed key during network edition software protecting equipment is permitted by the inspection soft ware authorization and/or changeable key and/or soft ware authorization permission checks the soft ware authorization permission whether legal.
15, method according to claim 14 is characterized in that, if the soft ware authorization permission is legal, then reclaims the soft ware authorization permission, otherwise does not allow software to discharge the soft ware authorization permission.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008101065667A CN101281569A (en) | 2008-05-14 | 2008-05-14 | Method for using network edition software protecting equipment to control software client terminal quantity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008101065667A CN101281569A (en) | 2008-05-14 | 2008-05-14 | Method for using network edition software protecting equipment to control software client terminal quantity |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101281569A true CN101281569A (en) | 2008-10-08 |
Family
ID=40014033
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2008101065667A Pending CN101281569A (en) | 2008-05-14 | 2008-05-14 | Method for using network edition software protecting equipment to control software client terminal quantity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101281569A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105354448A (en) * | 2015-12-07 | 2016-02-24 | 北京金山安全软件有限公司 | Authorization management method and device |
CN106951741A (en) * | 2017-03-15 | 2017-07-14 | 北京深思数盾科技股份有限公司 | A kind of software license management method and device |
CN108111534A (en) * | 2018-01-11 | 2018-06-01 | 新华三云计算技术有限公司 | A kind of method and device for controlling authorization |
CN111737660A (en) * | 2020-06-28 | 2020-10-02 | 浙江大华技术股份有限公司 | Method, system and storage medium for realizing software authorization |
-
2008
- 2008-05-14 CN CNA2008101065667A patent/CN101281569A/en active Pending
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105354448A (en) * | 2015-12-07 | 2016-02-24 | 北京金山安全软件有限公司 | Authorization management method and device |
CN106951741A (en) * | 2017-03-15 | 2017-07-14 | 北京深思数盾科技股份有限公司 | A kind of software license management method and device |
CN108111534A (en) * | 2018-01-11 | 2018-06-01 | 新华三云计算技术有限公司 | A kind of method and device for controlling authorization |
CN108111534B (en) * | 2018-01-11 | 2021-02-05 | 新华三云计算技术有限公司 | Method and device for controlling authorization permission |
CN111737660A (en) * | 2020-06-28 | 2020-10-02 | 浙江大华技术股份有限公司 | Method, system and storage medium for realizing software authorization |
CN111737660B (en) * | 2020-06-28 | 2023-11-17 | 浙江大华技术股份有限公司 | Method, system and storage medium for realizing software authorization |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103026347B (en) | Virutal machine memory in multicore architecture divides | |
CN101404056B (en) | Software protection method, apparatus and equipment | |
US8660964B2 (en) | Secure device licensing | |
CN112074836A (en) | Apparatus and method for protecting data through trusted execution environment | |
CN100495421C (en) | Authentication protection method based on USB device | |
CN102855446A (en) | Resource management system and corresponding method | |
CN103906054A (en) | Method and system for authorization of software function modules of internet of things | |
CN104700002A (en) | Software protecting, authorizing and registering method | |
CN106936588B (en) | Hosting method, device and system of hardware control lock | |
US20120173884A1 (en) | Method for remotely controlling and monitoring the data produced on desktop on desktop software | |
CN109598104B (en) | Software authorization protection system and method based on timestamp and secret authentication file | |
CN104573549A (en) | Credible method and system for protecting confidentiality of database | |
CN110996319B (en) | System and method for performing activation authorization management on software service | |
CN110990851B (en) | Static data encryption protection method and system | |
CN101866404A (en) | Software system module independent authorization control method and device | |
CN101414913A (en) | Computer network authentication system and method based on virtual technology | |
US7603566B2 (en) | Authenticated process switching on a microprocessor | |
CN105740725A (en) | File protection method and system | |
CN103268435A (en) | Intranet license generation method and system, and intranet license protection method and system | |
CN109918934A (en) | Research and development data safety and secrecy system based on tri- layers of dynamic encryption technology of AES | |
CN101281569A (en) | Method for using network edition software protecting equipment to control software client terminal quantity | |
CN101286987B (en) | Method for transferring authority license of software | |
CN105933117A (en) | Data encryption and decryption device and method based on TPM (Trusted Platform Module) key security storage | |
CN101458744A (en) | Digital copyright management proxy system based on dependable computing concept | |
CN101860436A (en) | Technology for accurately controlling system user data authority |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20081008 |